Which of the following attacks?

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.
This is an example of which of the following attacks?
A. Smurf attack
B. VLAN hopping
C. Blue snarfing
D. Spear phishing

Exam N10-008: CompTIA Network+

Free dumps for N10-008 in PDF format.

High quality N10-008 PDF and software. VALID exam to help you pass.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.